All language subtitles for riverside_dIXIZf5VoAMCI3A=_1.20of%20recon

af Afrikaans
ak Akan
sq Albanian
am Amharic
ar Arabic Download
hy Armenian
az Azerbaijani
eu Basque
be Belarusian
bem Bemba
bn Bengali
bh Bihari
bs Bosnian
br Breton
bg Bulgarian
km Cambodian
ca Catalan
ceb Cebuano
chr Cherokee
ny Chichewa
zh-CN Chinese (Simplified)
zh-TW Chinese (Traditional)
co Corsican
hr Croatian
cs Czech
da Danish
nl Dutch
en English
eo Esperanto
et Estonian
ee Ewe
fo Faroese
tl Filipino
fi Finnish
fr French
fy Frisian
gaa Ga
gl Galician
ka Georgian
de German
el Greek
gn Guarani
gu Gujarati
ht Haitian Creole
ha Hausa
haw Hawaiian
iw Hebrew
hi Hindi
hmn Hmong
hu Hungarian
is Icelandic
ig Igbo
id Indonesian
ia Interlingua
ga Irish
it Italian
ja Japanese
jw Javanese
kn Kannada
kk Kazakh
rw Kinyarwanda
rn Kirundi
kg Kongo
ko Korean
kri Krio (Sierra Leone)
ku Kurdish
ckb Kurdish (Soranî)
ky Kyrgyz
lo Laothian
la Latin
lv Latvian
ln Lingala
lt Lithuanian
loz Lozi
lg Luganda
ach Luo
lb Luxembourgish
mk Macedonian
mg Malagasy
ms Malay
ml Malayalam
mt Maltese
mi Maori
mr Marathi
mfe Mauritian Creole
mo Moldavian
mn Mongolian
my Myanmar (Burmese)
sr-ME Montenegrin
ne Nepali
pcm Nigerian Pidgin
nso Northern Sotho
no Norwegian
nn Norwegian (Nynorsk)
oc Occitan
or Oriya
om Oromo
ps Pashto
fa Persian
pl Polish
pt-BR Portuguese (Brazil)
pt Portuguese (Portugal)
pa Punjabi
qu Quechua
ro Romanian
rm Romansh
nyn Runyakitara
ru Russian
sm Samoan
gd Scots Gaelic
sr Serbian
sh Serbo-Croatian
st Sesotho
tn Setswana
crs Seychellois Creole
sn Shona
sd Sindhi
si Sinhalese
sk Slovak
sl Slovenian
so Somali
es Spanish
es-419 Spanish (Latin American)
su Sundanese
sw Swahili
sv Swedish
tg Tajik
ta Tamil
tt Tatar
te Telugu
th Thai
ti Tigrinya
to Tonga
lua Tshiluba
tum Tumbuka
tr Turkish
tk Turkmen
tw Twi
ug Uighur
uk Ukrainian
ur Urdu
uz Uzbek
vi Vietnamese
cy Welsh
wo Wolof
xh Xhosa
yi Yiddish
yo Yoruba
zu Zulu
Would you like to inspect the original subtitles? These are the user uploaded subtitles that are being translated: 1 00:00:00,290 --> 00:00:05,572 Hello guys, welcome to this course of recon for bug bounty hunters and penetration testers. 2 00:00:06,112 --> 00:00:12,955 So this course is fully focused on like reconnaissance on reconnaissance for bug bounty hunters and 3 00:00:12,995 --> 00:00:19,138 penetration testers. So let's hunt for bug not for bounty. If you find bugs then automatically 4 00:00:19,178 --> 00:00:27,606 you will get bounty. So don't run behind bounty run behind bugs. Okay. So I am Vivek Pandit, 5 00:00:27,686 --> 00:00:32,889 a bug bounty hunter, blogger, website developer and ethical hacker. I have founded more than 6 00:00:32,949 --> 00:00:39,973 500 bugs in various websites at HackerOne, Bugcrowd and some private programs. I have founded most 7 00:00:40,033 --> 00:00:45,256 of the bugs in the recon phase. That's why I am bringing this course to share my skills 8 00:00:45,296 --> 00:00:51,860 with you all so you can also find more bugs. So I invite you to take this course to upscale 9 00:00:51,880 --> 00:00:58,694 your career in cybersecurity. bug bounty hunting and penetration testing. Okay, so let's get 10 00:00:58,734 --> 00:01:01,241 a quick overview of course curriculum. 11 00:01:07,218 --> 00:01:13,263 So we will start with the introduction that we are doing right now and then we will go 12 00:01:13,303 --> 00:01:18,847 to subdomain enumeration from tools and then we are going to enumerate subdomains from websites 13 00:01:19,428 --> 00:01:25,753 and after that after enumeration of that subdomains we are going to filter that subdomains like 14 00:01:27,154 --> 00:01:32,399 we are going to filter only live domains. Okay, that the domains that are giving response. 15 00:01:32,419 --> 00:01:39,532 Okay, so in the fifth section, we are going to extract. URLs from internet from for a specific 16 00:01:39,572 --> 00:01:46,098 website and then in the section 6 we are going to find parameters from that URL or use some 17 00:01:46,158 --> 00:01:54,785 tools for that and we are also going to like brute force for parameters. So we will get 18 00:01:55,566 --> 00:02:01,550 some parameters that are not on internet also. Then after that we are going to sort those 19 00:02:01,671 --> 00:02:08,807 URLs and then we are going to use a tool. for automation for replacing parameters with payloads. 20 00:02:08,887 --> 00:02:16,510 Okay, so it can like replace 1000 of like parameters with payloads. Okay. And then after that, we 21 00:02:16,530 --> 00:02:24,033 are going to footprint a website using many different techniques and tools. So in the 11th 22 00:02:24,073 --> 00:02:28,835 section, we are going to learn how to use browser add ons for recon and in the 12th section, 23 00:02:29,235 --> 00:02:35,678 we are going to learn how to identify the WAF means web application And then we are also 24 00:02:35,698 --> 00:02:41,542 going to look for subdomain takeover vulnerabilities. And we are in the 14th section, we are going 25 00:02:41,602 --> 00:02:49,348 to like increase our scope of bug bounty by doing fuzzing or content discovery. In the 26 00:02:49,388 --> 00:02:56,333 15th section, we are going to put do a port scan and the 16th section, we are going to 27 00:02:56,393 --> 00:03:03,886 do fast port scanning. And in the 17th section, we are going to visually record for. vulnerabilities 28 00:03:03,926 --> 00:03:11,708 in websites and this is the 18 section. It is the most important section according to me 29 00:03:11,868 --> 00:03:17,090 because Google dorking is a very critical part of any reconnaissance process. So I have explained 30 00:03:17,250 --> 00:03:23,711 everything about Google dorking every like every single thing. Okay. And in the 19 section, 31 00:03:23,731 --> 00:03:29,453 we are going to implement our theory into practical and find various vulnerabilities in various 32 00:03:29,493 --> 00:03:35,345 websites. And then We are going to like I'm going to give you some tips like three tips 33 00:03:35,925 --> 00:03:45,974 on finding like advanced Google darking and then we are going to like do a full class on 34 00:03:46,054 --> 00:03:52,139 showdown darking and in the twenty third section we are going to like use that knowledge and 35 00:03:52,660 --> 00:03:59,205 dark like you showdown darking in practically and in the twenty third section we are going 36 00:03:59,265 --> 00:04:05,105 to. you should on in our command line or in our terminal. Okay. And in the 24th section, 37 00:04:05,165 --> 00:04:11,868 we are going to use github darking and find sensitive information for a specific website. 38 00:04:11,968 --> 00:04:18,232 Okay. And in the 25th section, I'm going to show you like some advanced vulnerability scanners 39 00:04:18,252 --> 00:04:23,895 that are used by bounty hunters and penetration testers for finding vulnerabilities in websites. 40 00:04:24,035 --> 00:04:30,798 Okay. In the 26th section, I'm going to show you. how to use Metasploit framework in our 41 00:04:30,878 --> 00:04:37,880 recon process. In the 27th section, I'm going to show you how to enumerate version of port 42 00:04:38,360 --> 00:04:45,562 using like Metasploit and in the 26th and 28th section, I have shared like 1000 of payloads 43 00:04:46,162 --> 00:04:53,344 that I have used like for finding so many bugs. Okay. And I will also share my own personal 44 00:04:54,125 --> 00:05:02,477 folder where I have stored all the like payloads. Okay. And in 29 section, I am going to like 45 00:05:02,637 --> 00:05:09,501 create four tools for our recon process. And I will also teach you how you can also create 46 00:05:09,541 --> 00:05:17,387 your own tools using self scripting. Okay. And this is a very like good part of this full 47 00:05:17,427 --> 00:05:25,778 course. And it is a it is the 29 section. And here you will clear all the concepts of bug 48 00:05:25,798 --> 00:05:30,603 bounty hunting and penetration testing. And in the 30th section, I'm going to give you 49 00:05:30,643 --> 00:05:41,576 a bonus like bonus tip. Okay, so let's meet on the course and like let's go to the course 50 00:05:41,596 --> 00:05:42,297 curriculum. Okay. 6183

Can't find what you're looking for?
Get subtitles in any language from opensubtitles.com, and translate them here.